Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
15-02-2022 13:49
Static task
static1
Behavioral task
behavioral1
Sample
4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exe
Resource
win7-en-20211208
General
-
Target
4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exe
-
Size
6.0MB
-
MD5
910713f54a0416c342cc46bbed1c53e3
-
SHA1
4363b9485c120676e5151974a4f682460a99d9d9
-
SHA256
4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83
-
SHA512
7e67cf773c0cd4afeae39b9a75e688d8c95f233fa8b0a40c1b07a786e4a108811e3a44acfb4b75a25ceae3dd2f15236b0c09ea272ea5621e1ddd8274ab2ccb50
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 4 IoCs
Processes:
WScript.exeflow pid process 13 796 WScript.exe 14 796 WScript.exe 15 796 WScript.exe 16 796 WScript.exe -
Executes dropped EXE 3 IoCs
Processes:
before.execleoidvp.exeIntelRapid.exepid process 472 before.exe 1116 cleoidvp.exe 1768 IntelRapid.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
before.execleoidvp.exeIntelRapid.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion before.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion before.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cleoidvp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cleoidvp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IntelRapid.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IntelRapid.exe -
Drops startup file 1 IoCs
Processes:
before.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IntelRapid.lnk before.exe -
Loads dropped DLL 9 IoCs
Processes:
4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.execleoidvp.exebefore.exepid process 1416 4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exe 1416 4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exe 1416 4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exe 1416 4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exe 1116 cleoidvp.exe 1116 cleoidvp.exe 472 before.exe 472 before.exe 472 before.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\droopt\before.exe themida \Users\Admin\AppData\Local\Temp\droopt\before.exe themida C:\Users\Admin\AppData\Local\Temp\droopt\before.exe themida \Users\Admin\AppData\Local\Temp\droopt\cleoidvp.exe themida \Users\Admin\AppData\Local\Temp\droopt\cleoidvp.exe themida C:\Users\Admin\AppData\Local\Temp\droopt\cleoidvp.exe themida C:\Users\Admin\AppData\Local\Temp\droopt\cleoidvp.exe themida \Users\Admin\AppData\Local\Temp\droopt\cleoidvp.exe themida behavioral1/memory/472-65-0x000000013F7C0000-0x00000001400D9000-memory.dmp themida behavioral1/memory/1116-67-0x0000000001110000-0x00000000017D1000-memory.dmp themida behavioral1/memory/472-66-0x000000013F7C0000-0x00000001400D9000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\droopt\before.exe themida behavioral1/memory/472-71-0x000000013F7C0000-0x00000001400D9000-memory.dmp themida behavioral1/memory/1116-70-0x0000000001110000-0x00000000017D1000-memory.dmp themida behavioral1/memory/1116-73-0x0000000001110000-0x00000000017D1000-memory.dmp themida \Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe themida \Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe themida C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe themida \Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe themida behavioral1/memory/1768-79-0x000000013F5E0000-0x000000013FEF9000-memory.dmp themida behavioral1/memory/1768-80-0x000000013F5E0000-0x000000013FEF9000-memory.dmp themida behavioral1/memory/1768-81-0x000000013F5E0000-0x000000013FEF9000-memory.dmp themida -
Processes:
before.execleoidvp.exeIntelRapid.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA before.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cleoidvp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IntelRapid.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
before.execleoidvp.exeIntelRapid.exepid process 472 before.exe 1116 cleoidvp.exe 1768 IntelRapid.exe -
Drops file in Program Files directory 3 IoCs
Processes:
4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exedescription ioc process File created C:\Program Files (x86)\foler\olader\acppage.dll 4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll 4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exe File created C:\Program Files (x86)\foler\olader\acledit.dll 4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
cleoidvp.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString cleoidvp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 cleoidvp.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
IntelRapid.exepid process 1768 IntelRapid.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
cleoidvp.exepid process 1116 cleoidvp.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exebefore.execleoidvp.exedescription pid process target process PID 1416 wrote to memory of 472 1416 4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exe before.exe PID 1416 wrote to memory of 472 1416 4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exe before.exe PID 1416 wrote to memory of 472 1416 4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exe before.exe PID 1416 wrote to memory of 472 1416 4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exe before.exe PID 1416 wrote to memory of 1116 1416 4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exe cleoidvp.exe PID 1416 wrote to memory of 1116 1416 4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exe cleoidvp.exe PID 1416 wrote to memory of 1116 1416 4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exe cleoidvp.exe PID 1416 wrote to memory of 1116 1416 4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exe cleoidvp.exe PID 1416 wrote to memory of 1116 1416 4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exe cleoidvp.exe PID 1416 wrote to memory of 1116 1416 4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exe cleoidvp.exe PID 1416 wrote to memory of 1116 1416 4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exe cleoidvp.exe PID 472 wrote to memory of 1768 472 before.exe IntelRapid.exe PID 472 wrote to memory of 1768 472 before.exe IntelRapid.exe PID 472 wrote to memory of 1768 472 before.exe IntelRapid.exe PID 1116 wrote to memory of 1008 1116 cleoidvp.exe WScript.exe PID 1116 wrote to memory of 1008 1116 cleoidvp.exe WScript.exe PID 1116 wrote to memory of 1008 1116 cleoidvp.exe WScript.exe PID 1116 wrote to memory of 1008 1116 cleoidvp.exe WScript.exe PID 1116 wrote to memory of 1008 1116 cleoidvp.exe WScript.exe PID 1116 wrote to memory of 1008 1116 cleoidvp.exe WScript.exe PID 1116 wrote to memory of 1008 1116 cleoidvp.exe WScript.exe PID 1116 wrote to memory of 796 1116 cleoidvp.exe WScript.exe PID 1116 wrote to memory of 796 1116 cleoidvp.exe WScript.exe PID 1116 wrote to memory of 796 1116 cleoidvp.exe WScript.exe PID 1116 wrote to memory of 796 1116 cleoidvp.exe WScript.exe PID 1116 wrote to memory of 796 1116 cleoidvp.exe WScript.exe PID 1116 wrote to memory of 796 1116 cleoidvp.exe WScript.exe PID 1116 wrote to memory of 796 1116 cleoidvp.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exe"C:\Users\Admin\AppData\Local\Temp\4634c70711270fa33ac44c43db967cc85b7e273aa47eabd07eaf7f215c89af83.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\droopt\before.exe"C:\Users\Admin\AppData\Local\Temp\droopt\before.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops startup file
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
-
C:\Users\Admin\AppData\Local\Temp\droopt\cleoidvp.exe"C:\Users\Admin\AppData\Local\Temp\droopt\cleoidvp.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\klirwxb.vbs"3⤵
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\gejcwdu.vbs"3⤵
- Blocklisted process makes network request
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\droopt\before.exeMD5
a5f561f29f736a1f99ef726773628fa3
SHA1acf172fa11ee345a6041784ef9f1021307f598dd
SHA256333acbfe28976ee28514bb425c2c461026572d0003a7378fba366716e408d822
SHA512ff75d12f607e407d190802be88f319cc6750f3898bc411199f3fd6976e24ed55296fed7ef562f97cbeb61cb1c0b3b635fba999c0780561c2f5a1b88d2b56160c
-
C:\Users\Admin\AppData\Local\Temp\droopt\before.exeMD5
a5f561f29f736a1f99ef726773628fa3
SHA1acf172fa11ee345a6041784ef9f1021307f598dd
SHA256333acbfe28976ee28514bb425c2c461026572d0003a7378fba366716e408d822
SHA512ff75d12f607e407d190802be88f319cc6750f3898bc411199f3fd6976e24ed55296fed7ef562f97cbeb61cb1c0b3b635fba999c0780561c2f5a1b88d2b56160c
-
C:\Users\Admin\AppData\Local\Temp\droopt\cleoidvp.exeMD5
fda089a638a02b64c5175fbed3e4918b
SHA1eef6c75a650b5d1f2f34b988fc88ceb328312c15
SHA256f294a9d0f15513f519dfda080b37906851d8614d1211abc5f6141cd6ef6bfe7f
SHA5127a9d15d37fa40898b49015f457546439a61ba7ba644b082d1c6bd0f10a6a7fded631937e255839beadf966c6577650f30601333bbb852a1a9625d1e561355c96
-
C:\Users\Admin\AppData\Local\Temp\droopt\cleoidvp.exeMD5
fda089a638a02b64c5175fbed3e4918b
SHA1eef6c75a650b5d1f2f34b988fc88ceb328312c15
SHA256f294a9d0f15513f519dfda080b37906851d8614d1211abc5f6141cd6ef6bfe7f
SHA5127a9d15d37fa40898b49015f457546439a61ba7ba644b082d1c6bd0f10a6a7fded631937e255839beadf966c6577650f30601333bbb852a1a9625d1e561355c96
-
C:\Users\Admin\AppData\Local\Temp\gejcwdu.vbsMD5
f158fce0a1059566f9cf50a540941ef7
SHA1dba71e72df35ce4d05217f6210543ba2a75e81bb
SHA2561f0668b5752fce21df66ab4cb9d266355378ac34800ed80713baf534133fea6c
SHA512bfc7b05beed455d19f03cd9383a9aacd5db1880ad538913819f7b24afc85d8ec2b0540cba4de4b21d9fa773ac0fccd40392ed276e916400775973e35a657afaf
-
C:\Users\Admin\AppData\Local\Temp\klirwxb.vbsMD5
711bfb8e90eb2e0f714bc6b7c6902614
SHA16d969bd7d7917593a629bf589bc309083b1cbc07
SHA2569ca9364d658b4a1482a3566683b902ff7697b3c2330da781b93f8bd2ac5b7be6
SHA5121195ede637fe2f947d3c0e92665cfb10360ed188a119ea69a93b999705887792552a1ee59bfcea885a8e814458b559f616190ce03f350cc9b823f60ec0757f83
-
C:\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exeMD5
a5f561f29f736a1f99ef726773628fa3
SHA1acf172fa11ee345a6041784ef9f1021307f598dd
SHA256333acbfe28976ee28514bb425c2c461026572d0003a7378fba366716e408d822
SHA512ff75d12f607e407d190802be88f319cc6750f3898bc411199f3fd6976e24ed55296fed7ef562f97cbeb61cb1c0b3b635fba999c0780561c2f5a1b88d2b56160c
-
\Users\Admin\AppData\Local\Temp\droopt\before.exeMD5
a5f561f29f736a1f99ef726773628fa3
SHA1acf172fa11ee345a6041784ef9f1021307f598dd
SHA256333acbfe28976ee28514bb425c2c461026572d0003a7378fba366716e408d822
SHA512ff75d12f607e407d190802be88f319cc6750f3898bc411199f3fd6976e24ed55296fed7ef562f97cbeb61cb1c0b3b635fba999c0780561c2f5a1b88d2b56160c
-
\Users\Admin\AppData\Local\Temp\droopt\before.exeMD5
a5f561f29f736a1f99ef726773628fa3
SHA1acf172fa11ee345a6041784ef9f1021307f598dd
SHA256333acbfe28976ee28514bb425c2c461026572d0003a7378fba366716e408d822
SHA512ff75d12f607e407d190802be88f319cc6750f3898bc411199f3fd6976e24ed55296fed7ef562f97cbeb61cb1c0b3b635fba999c0780561c2f5a1b88d2b56160c
-
\Users\Admin\AppData\Local\Temp\droopt\cleoidvp.exeMD5
fda089a638a02b64c5175fbed3e4918b
SHA1eef6c75a650b5d1f2f34b988fc88ceb328312c15
SHA256f294a9d0f15513f519dfda080b37906851d8614d1211abc5f6141cd6ef6bfe7f
SHA5127a9d15d37fa40898b49015f457546439a61ba7ba644b082d1c6bd0f10a6a7fded631937e255839beadf966c6577650f30601333bbb852a1a9625d1e561355c96
-
\Users\Admin\AppData\Local\Temp\droopt\cleoidvp.exeMD5
fda089a638a02b64c5175fbed3e4918b
SHA1eef6c75a650b5d1f2f34b988fc88ceb328312c15
SHA256f294a9d0f15513f519dfda080b37906851d8614d1211abc5f6141cd6ef6bfe7f
SHA5127a9d15d37fa40898b49015f457546439a61ba7ba644b082d1c6bd0f10a6a7fded631937e255839beadf966c6577650f30601333bbb852a1a9625d1e561355c96
-
\Users\Admin\AppData\Local\Temp\droopt\cleoidvp.exeMD5
fda089a638a02b64c5175fbed3e4918b
SHA1eef6c75a650b5d1f2f34b988fc88ceb328312c15
SHA256f294a9d0f15513f519dfda080b37906851d8614d1211abc5f6141cd6ef6bfe7f
SHA5127a9d15d37fa40898b49015f457546439a61ba7ba644b082d1c6bd0f10a6a7fded631937e255839beadf966c6577650f30601333bbb852a1a9625d1e561355c96
-
\Users\Admin\AppData\Local\Temp\nstD72E.tmp\UAC.dllMD5
adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exeMD5
a5f561f29f736a1f99ef726773628fa3
SHA1acf172fa11ee345a6041784ef9f1021307f598dd
SHA256333acbfe28976ee28514bb425c2c461026572d0003a7378fba366716e408d822
SHA512ff75d12f607e407d190802be88f319cc6750f3898bc411199f3fd6976e24ed55296fed7ef562f97cbeb61cb1c0b3b635fba999c0780561c2f5a1b88d2b56160c
-
\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exeMD5
a5f561f29f736a1f99ef726773628fa3
SHA1acf172fa11ee345a6041784ef9f1021307f598dd
SHA256333acbfe28976ee28514bb425c2c461026572d0003a7378fba366716e408d822
SHA512ff75d12f607e407d190802be88f319cc6750f3898bc411199f3fd6976e24ed55296fed7ef562f97cbeb61cb1c0b3b635fba999c0780561c2f5a1b88d2b56160c
-
\Users\Admin\AppData\Roaming\Intel Rapid\IntelRapid.exeMD5
a5f561f29f736a1f99ef726773628fa3
SHA1acf172fa11ee345a6041784ef9f1021307f598dd
SHA256333acbfe28976ee28514bb425c2c461026572d0003a7378fba366716e408d822
SHA512ff75d12f607e407d190802be88f319cc6750f3898bc411199f3fd6976e24ed55296fed7ef562f97cbeb61cb1c0b3b635fba999c0780561c2f5a1b88d2b56160c
-
memory/472-68-0x0000000077CE0000-0x0000000077CE2000-memory.dmpFilesize
8KB
-
memory/472-71-0x000000013F7C0000-0x00000001400D9000-memory.dmpFilesize
9.1MB
-
memory/472-74-0x000007FEFC511000-0x000007FEFC513000-memory.dmpFilesize
8KB
-
memory/472-66-0x000000013F7C0000-0x00000001400D9000-memory.dmpFilesize
9.1MB
-
memory/472-65-0x000000013F7C0000-0x00000001400D9000-memory.dmpFilesize
9.1MB
-
memory/1116-70-0x0000000001110000-0x00000000017D1000-memory.dmpFilesize
6.8MB
-
memory/1116-73-0x0000000001110000-0x00000000017D1000-memory.dmpFilesize
6.8MB
-
memory/1116-69-0x0000000077E80000-0x0000000077E82000-memory.dmpFilesize
8KB
-
memory/1116-67-0x0000000001110000-0x00000000017D1000-memory.dmpFilesize
6.8MB
-
memory/1416-54-0x0000000076071000-0x0000000076073000-memory.dmpFilesize
8KB
-
memory/1768-81-0x000000013F5E0000-0x000000013FEF9000-memory.dmpFilesize
9.1MB
-
memory/1768-80-0x000000013F5E0000-0x000000013FEF9000-memory.dmpFilesize
9.1MB
-
memory/1768-79-0x000000013F5E0000-0x000000013FEF9000-memory.dmpFilesize
9.1MB